Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

International Journal of Recent Technology and Engineering (IJRTE)

ISSN: 2277-3878 (Online), Volume-8 Issue-6, March 2020

Multi level Authentication for secure Attendance


System
Ashish Chauhan, Shruti Khosla, Muskan Sharma, Sarthak Sahni

 the unfortunate truth is that hackers,crackers are everywhere


Abstract: Multi level Authentication means authentication of who look for an opportunity to seize access and control of
user at different levels. Attendance system concerns with taking the desired application or system.
students attendance, with complete efficiency and awareness, this Accessing attendance system is used in many educational
all used to happen in a very conventional way, wherein there
institutions to instill discipline. There are conventional
were more chances of discrepancy in records.
Authentication is a major concern as safety is a priority methods to do so, still there are many complexities in
which proves the validity of the user, when designing a software handling them, so the new approach which concerns both
which stores large amounts of data and which has already efficiency and Authentication is very much required.
existed in the past, and has certain loopholes. To fill these Multifactor authentication helps to improve security. The
loopholes and to make this process more reliable Multi Level chances that unauthenticated user can have the access to
Authentication is used. assets decreases.
Multi-Factor Authentication used here have three phases, The factors of authentication fall into the following
starting with Login credentials which goes unique even if
categories:
students share their credentials with their peers their peers won’t
be able to login using their phones as IMEI was stored initially Knowledge factors includes something that the user must
during the time of registration. This code is stored in the know to get access to resources:Passwords, Pins ,IDs all fall
database without the knowledge of the student. We have the next into this category.
phase which is OTP generation which is secured using RSA sent Possession factors includes something that the user must
to the registered mobile number that is very unique as the OTP is have to get the access to the system . It includes smart
sent only to the registered mobile number. The last phase which phones with OTP apps,one-time password tokens (OTP
ensures the presence of student in the class is QR code scanning, tokens), employee ID cards and SIM cards,key fobs
where in a student scans QR code shared by the teacher in the
class . After scanning the QR code the attendance gets stored in
Inherence factors includes any technical scans, such as
the database. The purpose of this Attendance system is to QR Code scans or biometrics the user has that are require for
overcome the drawbacks of the already existing conventional getting the access to the system. This category includes the
way which includes marking attendance manually which was a biological traits such as iris scans retina scans, fingerprint
time taking process. By introducing this attendance system using scans, facial recognition, voice recognition, hand geometry
multi level authentication we have established a more advanced, and even earlobe geometry.
more efficient and more secure unlike conventional attendance It is important to know that the security doesn't only get
system. Multi level authentication can be used in various affected by the no of factors involved but also how the
application where security of the assets is the main concern.
factors are applied. In each category, the choices we made
Keywords : Attendance ,Multilevel Authentication ,OTP for authentication rules greatly affect the security.Weak
,QR code ,RSA ,Smartphone Authentication password mechanism, help attackers to hack the password
and can get the access to system. The most accurate
I. INTRODUCTION practices include requiring strong passwords that which are
updated regularly. Facial recognition systems can be
No matter what kind of software or application we take, the defeated by holding up a picture, so QR Code Scan System
requirements for the security are essential. If it handles is a unique and non hackable way of improving
emails or functions as attendance system or banking systems, security.OTP generation system can also have drawbacks as
attacker can change the otp during transmission of otp from
backend server to the authenticated user.
Manuscript received on March 15, 2020.
Revised Manuscript received on March 24, 2020. II. LITERATURE SURVEY
Manuscript published on March 30, 2020.
* Correspondence Author There are several studies to improve attendance-taking using
Ashish Chauhan*, Asst. Professor, Department of Information different technology.
technology, SRM Institute of Science and technology.
1. ’An efficient,automatic Attendance System using
Shruti Khosla B.Tech Scholar, Department Information Technology,
SRM Institute of Science and Technology. Fingerprint Verification technique’,(2010)
Muskan Sharma is B.Tech Scholar, Department of Information According to Saraswat, C., & Kumar, A. , biometrics
Technology SRM Institute of Science and Technology approach is better when dealing with
Sarthak Sahni is B.Tech Scholar, Department of Information cheating.Temperament of identification and sharing of QR
Technology SRM Institute of Science and Technology.
Code can be done.Attendance cheating is insufficient via the
© The Authors. Published by Blue Eyes Intelligence Engineering and use of QR code.
Sciences Publication (BEIESP). This is an open access article under the
CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-
nd/4.0/)

Retrieval Number: F9247038620/2020©BEIESP Published By:


DOI:10.35940/ijrte.F9247.038620 Blue Eyes Intelligence Engineering
Journal Website: www.ijrte.org 4216 & Sciences Publication
Multi level Authentication for secure Attendance

2. ’Attendance checking system using QR Code,(2014) time registration of the user and phone in which a unique 15
’Baban showed the implementation of a basic attendance- - digit IMEI is stored that identifies a valid mobile phone.
taking system via students' smart phones using QR code This unique code maps the user identity with the device
scanning. The system generates the reports. It is a generic which detects the authentication of the user. The IMEI code
design for re implementation but does not raise issues of gets stored in the database and through this unique code the
cheating in attendance. user and the phone is identified. IMEI of the user is checked
[3]’Student Attendance System using QR Code’,(2014) against the IMEI number which is stored in database at the
Masalha & Hirzallah designed a mechanism for attendance time of registration, therefore the user cannot login with any
using a QR code with multiple security factors that are used other device. The chances of proxy will decrease. The
for elimination of false registration. The additional factors mapping of the user and the device makes the user to be
include biometrics which is GPS location and selfie. GPS physically present for the attendance mechanism.
seemed to be a good non-biometric approach apart of QR
code. Authentication through OTP is the second level of
[4] ’Using QR Code for attendace tracking’,(2015) authentication. This one time password will automatically
Deugo proposed a unique mechanism according to which the verified at the receiver side. The OTP is a unique code that
Qr codes need to be generated by students and then bring is uniquely and randomly generated during each event of
that Qr code in class so that teacher can scan all the Qr codes authentication which adds an additional layer of security.
generated by student.However this mechanism do not Even if the attacker hacks the first level of authentication
provide time efficiency. ,OTP helps to keep the system safe. The backend server
[5] ’Multi-Factor Authentication System’,(2018) generates a secret key and shares it with the service
Yew Kwang Hooi, Khairul Shafee Kalid and Serdarmammet
generating the OTP. Using the RSA Algorithm, the OTP
Tachmammedov proposed that implementes the use of QR
code is encrypted creating a encrypted code. This encrypted
code with GPS location to make a secure attendance
code is then send to the receiver, so during the transmission
mechanism.The proposed mechanism helps to tracks
of OTP no one can change the otp. On the receiver’s end the
student through GPS by maintaining an active login session
message is decrypted and displayed before the user. Doing
on the smart phone that is being used. This approach needs
this assure the confidentiality of the OTP which is only for
phone's IMSI number registration with identity of the
user. After verification is done at the backend, the student is
user.The continuos tracking of server is the solution for the
same. asked to follow the third level of authentication.
Literature review has showed preferences for QR codes as
compared to biometrics because of scalability reasons. It is Authentication through QR code is the third level of
not error-proof, which requires additional checks conducted authentication, provides the students to access the lectures.
using OTP or IMEI during the registration.None of the work, The lecturers register to the system by entering the required
explains how potential error is detected via information details.Then the lecturer will enter the subject and unique
processing. QR code is then generated by the server. At the beginning of
The report has all the best of conclusions , which works on the class, the lecturer displays the QR code via the projector.
3FA, starting with Login credentials wherein checks are The first time user, students have to register to the
conducted using IMEI during the registration, which is application. The logged in students have to then scan the QR
unique to every user, then it goes by QR Code in which the code. The attendance is recorded once the students scan the
scan can be only done during the ongoing class and then QR code.
OTP features ( A) ALGORITHM
using two algorithm(RSA), so that no attack can occur while
generating OTP. STEP 1. Start and install the app.
This makes the application efficient yet hack free. STEP 2. If the person is student, then go to student
section or else if the person is teacher,
III. METHODOLOGY then go to teacher section
STEP 3. If Student then, first the student needs to
The goal of the surveys conducted is to find the issues in register.
taking attendance of students. Surveys and interviews of the STEP 4. If teacher then, first the teacher needs to
faculties and students are conducted to investigate the register.
current methods used and the issues that come across during STEP 5. The teacher can login after successful
attendance taking. Data obtained through the feedback of the registration and go to attendance section
faculties and the students is analyzed. Cheating during and generate the QR code for attendance.
attendance is an issue that came across with the attendance STEP 6.
system and therefore Multi level authentication prevents the A) The student can login using the
issue in the current attendance taking process. The process login credentials which is first
of multi level authentication involves three levels of level of authentication.
authentication that is 1. Authentication through smart B) After login the second level of
phones, 2. Authentication through OTP and authentication is OTP which will
3.Authentication through QR Code. be sent to user’s mobile number.

Authentication through smart phones contains a user


interface created on Android Studios through which the
registration of user and the phone is done. There is a one

Retrieval Number: F9247038620/2020©BEIESP Published By:


DOI:10.35940/ijrte.F9247.038620 Blue Eyes Intelligence Engineering
Journal Website: www.ijrte.org 4217 & Sciences Publication
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878 (Online), Volume-8 Issue-6, March 2020

C)Third level of authentication is QR code which is already There are 3 databases used in the system.
generated by lecturer and student will scan the QR 1. Student_details
code and get the attendance marked. 2. Attendance_details
STEP 7. Stop. 3. Teacher_details
The first one is for student which is used to store the details
of student
Open Application

Choose either student


option or teacher option

First
Register first
Time YES

The second one is for teacher which is used to store the


NO details of teacher.
Login
NO

Check if the login


credentials are correct

YES

The third is for storing the attendance of student.

IF STUDENT IF TEACHER

Enter the OTP


generated by Generate the
backend server QR code

Student Scans the


QR code generated
Scan QR code
by lecturer

Save attendance and


send info to database

Retrieval Number: F9247038620/2020©BEIESP Published By:


DOI:10.35940/ijrte.F9247.038620 Blue Eyes Intelligence Engineering
Journal Website: www.ijrte.org 4218 & Sciences Publication
Multi level Authentication for secure Attendance

IV. IMPLEMENTATION  After successfully login into the system, the system will
ask student to enter the registered mobile number and a
 Start and install the app.
OTP will be sent to student’s mobile number which is
 After the installation of the app, there will be two
second level of authentication
option if the person is student, then the person will
select student option and if the person is teacher
then the person will select teacher option.

 If the user enter the correct OTP number then,the OTP


received will automatically be filled .After verified by
 If the person is teacher, then teacher will register using the the system, the next activity will come which is QR
registration form in the app. scanning which is third level of authentication.
 After successful registration, teacher can login using the  For successful QR scanning the system will ask student to
login credentials and go to attendance activity. enter the registration number.
 The teacher will have to generation a QR code using the When the student will scan the QR code generated by
subject and the date . lecturer ,attendance will be marked.

In the student section the student will have to register


and at the time of registration the IMEI code the mobile will
automatically be stored in the database with al the other
details without letting the student know. V. LIMITATIONS
 Student can login using the login credentials and at the This system had been designed using Android studio which
time of login the IMEI code will also be checked by the limits the use of application for some deice like iPhones.
system. Also, as the first authentication is through smart phones
which is using IMEI number so every time students need to
inform the administration before changing their phones .
The students must carry their phones all the time as
attendance will be marked through this application only.
Moreover, the internet connection is required,

VI. RESULT AND DISCUSSION


The proposed System requires amalgamation of multiple
factors – IMEI code, QR code, OTP for authentication of the
Attendance system as built under this research has cleared
out discrepancy in storage of data and also false attendance
pattern.

Retrieval Number: F9247038620/2020©BEIESP Published By:


DOI:10.35940/ijrte.F9247.038620 Blue Eyes Intelligence Engineering
Journal Website: www.ijrte.org 4219 & Sciences Publication
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878 (Online), Volume-8 Issue-6, March 2020

The multiple combinations used such as OTP generation for 5. Deugo, D. (2015). Using qr-codes for attendance tracking. In
Proceedings of the International Conference on Frontiers in
increasing the security, Login linked with mapping of IMEI
Education: Computer Science and Computer Engineering (FECS)
number of mobile phones to the database, and then QR code 6. Saraswat, C., & Kumar, A. (2010). An efficient automatic attendance
scanning marking a confirmed presence of student in the system using fingerprint verification technique. International Journal
class. on Computer Science and Engineering,
The manual work of the teacher reduces. 7. Rahul Kale, Neha Gore, Kavita, Nilesh Jadhav, Swapnil Shinde
(2013)“ Review Paper on Two Factor Authentication Using Mobile
FACTORS RESULT
Phone” International Journal of Innovative research and Studies.
Login Credentials No unauthorized user can access
8. Dongare Priyanka, Gunjal Pratiksha, Gujar Prashant(2018), “An
the system without knowing the
implementation of fingerprint and aadhar based student attendance
correct login credentials, the user
system",
has to login from the same device
9. Benfano Soewito, Ford Lumban Gaol, Echo Simanjuntak, Fergyanto
since the IMEI code generated is
E. Gunawan “Attendance System on Android Smartphone”
mapped with the IMEI code
International Conference on Control, Electronics, Renewable Energy
stored in the database.
and Communications (ICCEREC), 2015.
10. Josphineleela. R. and M. Ramakrishnan, An Efficient Automatic
Attendance System Using Fingerprint Reconstruction Technique .
International Journal of Computer Science and Information Security,
OTP Generation It is a security measure which Vol. 10, No. 3, March 2012.
changes everytime we login into 11. O. Shoewu and O. A. Idowu, Development of Attendance
the system and becomes invalid Management System using Biometrics. The Pacific journal of Science
after sometime, therefore the OTP and Technology. Volume 13, Number 1, May 2012.
cannot be hacked even if the
attacker figure outs the login
credentials AUTHORS PROFILE
QR Code This ensures the physical Ashish Chauhan is working as Asst. Professor In
presence of the student Department of Information technology at SRM
Institute of Science and technology. He has done
VII. CONCLUSION his B.Tech from UPTU and M.Tech from UTU
and currently pursuing Ph.D. He has experience
This study has investigated that: of more than 10 years in field of teaching and
1. The attendance system can be made more efficient, research. He is Member of many International
Societies and Associations like UACCE,
less complex and cheat free by using 3F IACSIT, IFERP and ASSET. He has published
authentication system also called Multi Factor many research papers in the field of cyber
Authentication system. security in many National and International
2. This system is a new age, verified, well tested, Journals of repute. His area of interest is
Information Security, Network Security and
promising, cost effective and technologically Distributed computing.
sound. That marks a bar for a cheat free Attendance
system making cheating unappealing and easily Shruti Khosla B.Tech Scholar in Department
detectable. Information Technology from SRM Institute of
Science and Technology. Her area of interest in
3. Attendance system as build under this research has her degree program are database management,
cleared out discrepancy in storage of data and also Information and Network Security.
false attendance pattern. She is keen to learn new technologies and expert
4. This attendance system has reduced all the time in python and Android Studio She is currently
studying research project on Information security.
taking manual work that the lecturer had to go She is being selected for MS program for RMIT,
through before starting the lecture. Australia
5. This system reduces the drawbacks of the previous
existing system as it is less time consuming because Muskan Sharma is B.Tech Scholar
inDepartment of Information Technology
the students have to scan the QR code at the same
SRM Institute of Science and Technology. Her
time. area of interest in her degree program are
database management, Information and Network
REFERENCES Security.
She is keen to learn new technologies and expert
1. Baban, M. H. M. (2014). Attendance checking system using quick in python, data Science and Android Studio. She
response code for students at the university of sulaimaniyah. Journal is placed Cognizant and currently undergoing
of Mathematics and Computer Science (JMCS) training at Cognizant training centre Pune
2. Yew Kwang Hooi, Khairul Shafee Kalid and Serdarmammet
Tachmammedov (2018). MULTI-FACTOR ATTENDANCE Sarthak Sahni is B.Tech Scholar inDepartment
AUTHENTICATION SYSTEM at the University Technology of Information Technology SRM Institute of
PETRONAS. Department of Computer and Information Sciences Science and Technology. His area of interest in
3. Aleksandr Ometov , Sergey Bezzateev ,Niko Mäkitalo ,Sergey his degree program are database management,
Andreev, Tommi Mikkonen and Yevgeni Koucheryavy(2018). Multi- Information and Network Security.
Factor Authentication. Laboratory of Electronics and She is keen to learn new technologies and expert
Communications Engineering, Department of Security of in java, python and Android Studio. He is placed
Cyberphysical Systems, Department of Computer Science, University Cognizant and currently undergoing training at
of Helsink. Cognizant training centre Pune
4. Masalha, F & Hirzallah, N. (2014). A student attendance system
using QR code. International Journal of Advanced Computer Science
and Applications.

Retrieval Number: F9247038620/2020©BEIESP Published By:


DOI:10.35940/ijrte.F9247.038620 Blue Eyes Intelligence Engineering
Journal Website: www.ijrte.org 4220 & Sciences Publication

You might also like